A multi-step attack-correlation method with privacy protection

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A First Step towards Privacy Leakage Diagnosis and Protection

In this paper, we present a first step for designing a privacy leakage diagnosis and protection system using two privacy definitions and a new definition, and then evaluate a prototype program. The diagnosis is based on major notions of privacy: k-anonymity and (c, l)-diversity. Furthermore, the diagnosis include another method that analyze sensitivity of each attribute values. The prototype pr...

متن کامل

Automatic multi-step attack pattern discovering

Current techniques employed in security alert correlation area for multi-step attack recognition purpose are intricate to be performed due to the complexity of the methods and huge computing workload generated during alert analysis and processing. In this paper, we proposed a new method of alert correlation aiming at providing concentrated security event information and thus finding multi-step ...

متن کامل

New Multi-step Worm Attack Model

The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack patte...

متن کامل

A Multi-Step Framework for Detecting Attack Scenarios

With growing dependence upon interconnected networks, defending these networks against intrusions is becoming increasingly important. In the case of attacks that are composed of multiple steps, detecting the entire attack scenario is of vital importance. In this paper, we propose an analysis framework that is able to detect these scenarios with little predefined information. The core of the sys...

متن کامل

Mapping health data: improved privacy protection with donut method geomasking.

A major challenge in mapping health data is protecting patient privacy while maintaining the spatial resolution necessary for spatial surveillance and outbreak identification. A new adaptive geomasking technique, referred to as the donut method, extends current methods of random displacement by ensuring a user-defined minimum level of geoprivacy. In donut method geomasking, each geocoded addres...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Communications and Information Networks

سال: 2016

ISSN: 2096-1081,2509-3312

DOI: 10.1007/bf03391586